Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS5564038 A
Publication typeGrant
Application numberUS 08/246,648
Publication dateOct 8, 1996
Filing dateMay 20, 1994
Priority dateMay 20, 1994
Fee statusPaid
Also published asDE69532936D1, EP0684538A1, EP0684538B1, US5771347
Publication number08246648, 246648, US 5564038 A, US 5564038A, US-A-5564038, US5564038 A, US5564038A
InventorsJeffrey A. Grantz, J. Robert Ure
Original AssigneeInternational Business Machines Corporation
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period
US 5564038 A
Abstract
A method is provided to permit copies of software products to be installed on systems, with a predetermined delay before commencement of a designated test period. The predetermined delay provides for a cumulative elapsed time, beginning with the installation of the software product to be evaluated during the designated test period, to allow for miscellaneous starts of the computer system prior to productive use for the purpose of evaluation during the user trial period. The miscellaneous starts may be associated with software product installation procedures during preload activities, attachment of devices and/or adapters to tailor the system to a particular user configuration, or to otherwise "boot" or check the system prior to productive use.
Images(3)
Previous page
Next page
Claims(4)
What is claimed is:
1. A method for preventing continued use of a protected computer program in a data processing system beyond a designated test period, said data processing system including a valid password, date stamp, and timer, said method comprising the steps of:
(a) providing an initial time setting for said timer at the time of installation of said protected computer program in said data processing system;
(b) making a determination as to whether said valid password has been entered;
(c) continuing with step (d) if said valid password has not been entered;
(d) making a determination as to whether said date stamp has been created;
(e) continuing with step (i) said date stamp has been created;
(f) incrementing said timer to measure cumulative elapsed time of said data processing system while active:
(f) incrementing said timer to measure cumulative elapsed time of said data processing system while active:
(h) creating said date stamp if said predetermined value has been reached;
(i) making a determination as to whether the current date exceeds the date associated with said date stamp by an amount equal to or greater than said test period; and
(j) if the result of making said determination in step (i) is true, causing the protected computer program to be disabled.
2. The method as in claim 1 further comprising the step of:
sending a message to the user indicating that said valid password is required for use of said protected computer program beyond said test period.
3. The method as in claim 1 wherein said predetermined value is 24 hours.
4. The method as in claim 1 wherein said designated test period is 60 days.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates generally to the field of digital data processing systems, and more specifically to a method for managing access to, and authentication of, an operating system or various application software program products which may be processed by the systems to ensure that the operating system or application software program products are used according to the terms of the product's license agreements.

2. Description of Related Art

Growth in the personal computer industry has created a large market for operating system and application software products usable on particular personal computer systems. Accordingly, companies are in the business of developing operating system and application software products which are then marketed to personal computer owners. Typically, such computer software products are marketed on a fixed fee basis in which a user purchases a copy of the software, usually under terms of a license agreement. It has been a characteristic of this industry that in order for the developers of the software to recover the often quite large investment in research and development of the software product, and also the costs of manufacture and marketing, that the purchase price of such software items has been relatively high. This high purchase price has been a barrier, in some circumstances, to the widespread licensing of some software and has limited the penetration in some markets. In addition, some users are reluctant to incur such a purchase without first operating the software, since the suitability of software is very difficult to judge without actually using it.

In order to afford users an opportunity to evaluate a particular operating system or application software product, a developer may offer the user a "trial period" during which the user is granted the right to use the operating system or application software product. Upon expiration of the trial period, the user may either license the product or stop using the product.

Growth in the personal computer industry has also led many personal computer systems manufacturers to "preload" operating system and/or certain application software products on the systems. The preloaded systems may be marketed as "turn-key" solutions, whereby the user is not required to install the software product(s) and may begin useful operation shortly after turning the system on. In addition, preloaded software products may be used by a software vendor as a method of introducing the user to a particular software product(s), which the user may purchase upon the expiration of a trial period.

As is well known, a major problem with regard to the distribution of such software products is the copying of such products or the unauthorized use of such products without compensating the developer for their value. Unauthorized use of proprietary computer programs is widespread. The problem of unauthorized use is exacerbated when software products are offered for use during a trial period. Upon expiration of the trial period, without a means for managing license verification of the software product, the user may continue using the software product without compensating its developer.

Various methods have been employed for preventing the use of programs by persons who have obtained them in an unauthorized manner. For example, U.S. Pat. No. 5,014,234 to Edwards is for a System with Software Usage Timer and Counter for Allowing Limited Use But Preventing Continued Unauthorized Use Of Protected Software. Edwards discloses providing a clock having an initial time setting at the time of installation of a software product on a computer system, a constant representing a predetermined amount of time, and a counter. Each time the protected software is operated, the counter is incremented. Determinations are made whether the counter has reached a predetermined value, or whether the current time sensed exceeds the time when the software was installed by an amount equal to or greater than the constant. If the result of either determination is true, a warning is sent to the user and the counter is decremented each further time that the software is subsequently operated. Finally, the software is disabled when the counter has reached a second predetermined value.

The system as disclosed in Edwards, may fail to provide the user an adequate trial period for a system having a software product(s) that have been preloaded. That is, when preloading software products, Edwards would begin to track a user trial period at the time of preloading. As a result, the length of the trial period realized may be less than the length of the trial period designated by the developer. It is envisioned that no trial period could result in a circumstance when the time at which the computer system is purchased and activated by a user exceeds the time at which the software products were preloaded by an amount greater or equal to the test period.

SUMMARY OF THE INVENTION

According to the invention, a method and apparatus are provided for preventing continued use of a protected computer program product in a data processing system beyond a designated test period. The data processing system includes a date stamp, and timer, wherein the date stamp represents the start of the designated test period, and the timer measures elapsed time after the protected computer program product is installed and before the commencement of the designated test period. According to one aspect of the invention, a determination is made as to whether the date stamp has been created. If the date stamp has been created a determination is made as to whether the current date exceeds the date associated with the date stamp by an amount greater than the designated test period; and if the designated test period is exceeded the protected computer program is disabled. Otherwise, the timer is incremented in order to measure elapsed time of the data processing system while active. A determination whether the timer has reached a predetermined value is made and after the predetermined value has been reached, the date stamp is created. After the date stamp has been created the system compares the current date to the date associated with the date stamp, and if the designated test period is exceeded the protected computer program is disabled.

BRIEF DESCRIPTION OF THE DRAWING(S)

The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of practice, together with further objects and advantages thereof, may be best understood by reference to the following description taken in conjunction with the accompanying drawing figures.

FIG. 1 shows a personal computer comprising a system unit, keyboard, mouse and display.

FIG. 2 shows a block diagram of the components of the personal computer shown in FIG. 1.

FIG. 3 shows a computer system with in-memory components for allowing a trial period according to the present invention.

FIG. 4 is a flow chart illustrating a method for allowing a trial period according to the present invention.

DESCRIPTION OF THE ILLUSTRATIVE EMBODIMENT(S)

The following detailed description is of the best presently contemplated mode for carrying out the invention. This description is not to be taken in a limiting sense but is made merely for the purpose of illustrating the general principles of the invention since the scope of the invention is best defined by the appending claims.

The invention may be run on a variety of computers under a number of different operating systems. The computer could be, for example, a personal computer, a mini computer, or a main frame computer. The computer may be a standalone system, part of a network such as a local area network or wide area network or a larger teleprocessing system. For purposes of illustration only, the invention is described as implemented on a personal computer, such as IBM's PS/2 computer series, although the specific choice of computer is limited only by memory and disk requirements.

Referring now to the drawings, and more particularly to FIG. 1, there is shown a personal computer system 10, comprising a system unit 11, a keyboard 12, a mouse 13 and a graphics display device or monitor 14. The keyboard 12 and the mouse 13 constitute user input devices, and the display device 14 is a user output device. The mouse 13 is used to control a cursor 15 displayed on the screen 16 of the display device 14.

FIG. 2 shows in block diagram form the components of the personal computer shown in FIG. 1. The system unit 11 includes a system bus 21 to which the various components are attached and by which communication between the various components is accomplished. A microprocessor 22 is connected to the system bus 21 and is supported by read only memory (ROM) 23 and random access memory (RAM) 24, also connected to system bus 21. The microprocessor 22 in the IBM PS/2 series of computers is one of the Intel family of microprocessors including the 80286, 80386 or 80486 microprocessors, but other microprocessors including, but not limited to, Motorola's family of microprocessors such as the 68000, 68020 or 68030 microprocessors and various RISC (Reduced Instruction Set Computer) microprocessors manufactures by IBM, Hewlett-Packard, Sun Microsystems, Intel, Motorola and others may be used in a specific computer.

The ROM 23 contains, among other code, the Basic Input/Output System (BIOS) which controls basic hardware operations, such as interactions of the disk drives and the keyboard. The RAM 24 is the main memory into which the operating system, data files and application programs are loaded. A memory management chip 25 is connected to the system bus 21 and controls Direct Memory Access (DMA) operations, including paging data between RAM 24 and a hard disk drive 26 and a floppy disk drive 27.

To complete the description of the system unit 11, there are three I/O controllers. These are the keyboard controller 28, the mouse controller 29, and the video controller 30, all of which are connected to the system bus 21. As the names imply, the keyboard controller 28 provides the hardware interface for the keyboard 12, the mouse controller 29, hardware interface for the mouse 13, and the video controller 30 provides the hardware interface for the graphic display device 14.

The hardware illustrated in FIGS. 1 and 2 is typical but may vary for a specific application; that is, there may be other peripherals, such as optical storage media, audio I/O, printers and the like. The invention is specifically directed to an enhancement to the operating system which controls or "runs" the hardware or an application software program which runs under the control of the operating system. The invention may be added to an existing operating system or application software program, or it may provide the basis of an entirely new operating system or application software program.

The manner in which the invention is implemented may differ from operating system to operating system, or from application software program to application software program. One possible embodiment is illustrated in FIG. 3. The RAM 24 may contain, among other code, operating system 32, one or more application software programs 34, timer 36 for keeping track of cumulative elapsed time that the data processing system 10 is active, and an in-memory model 38 for storing a date stamp.

When the user elects to start by "booting" the system 10, registration data will be tested for the protected computer program product. The "protected computer program product" may be either operating system 32 or application software product 34, whichever is the product to be protected. As the protected computer program is loaded, timer 36 is started and incremented while the data processing system 10 is operated until a predetermined value of time is reached. Having reached the predetermined value, a date stamp is created and stored in in-memory model 38. Thereafter, the current date will be compared to the date associated with the date stamp to establish whether a designated test period has been exceeded. Upon expiration of the designated test period, the computer program may be disabled or destroyed.

Although timer 36 and in-memory model 38 are shown as discrete elements in FIG. 3, either may be integral to the protected computer program product. That is, timer 36 or in-memory model 38 representing the date stamp may be functionally part of either operating system 32 or application software product 34. Moreover, the contents of timer 36 and in-memory model 38 are stored, for example on hard disk 26, so as to preserve the contents of each during a first use of the protected computer program product and each subsequent use of the protected computer program product.

The software which will now be described functions to prevent continued unauthorized use of protected software products beyond a designated test period and to manage access to, and authentication of, the protected software products. The method hereinafter described permits copies of software products to be installed on systems, with a predetermined delay before commencement of the test period. The predetermined delay provides for a cumulative elapsed time, beginning with the installation of the software product to be evaluated during the test period, to allow for miscellaneous starts of the computer system prior to productive use for the purpose of evaluation during the user trial period. The miscellaneous starts may be associated with software product installation procedures during preload activities, attachment of devices and/or adapters to tailor the system to a particular user configuration, or to otherwise "boot" or check the system prior to productive use.

The flow diagram in FIG. 4 shows a possible mode of operation of the invention. In the flow diagram, the graphical conventions of a diamond for a test or decision and a rectangle for a process or function are observed. These conventions are well understood by programmers skilled in the art, and the flow diagram is sufficient to enable a programmer of ordinary skill to write code in any suitable computer programming language such as BASIC, Pascal, or C for a computer, such as the IBM Personal Series (PS/2) family of computers which supports those languages.

Block 410 begins, after first entering from block 400, by checking whether a valid password has been entered during the start up or loading of the protected computer program product. The determination may be made by prompting the user to input the valid password every time the protected computer program product is loaded. Alternatively, a register or field for storing the valid password may be examined in order to verify that the valid password had been previously entered by the user and stored. If the valid password has, in fact, been entered, the YES branch of decision block 410 serves as input to block 490, where the procedure exits and continues with loading the protected computer program product. Otherwise, the NO branch of decision block 410 serves as input to decision block 420, where the system determines whether a date stamp has been created. If no date stamp has been created, the NO branch of decision block 420 is taken to block 430, where the system determines whether timer 36 has been initialized. If it is determined that timer 36 has not been initialized, the NO branch of decision block 430 is taken to block 435 where timer 36 is initialized. Having initialized timer 36, block 435 serves as input to block 440. Referring again to decision block 430, if it is determined that timer 36 had been previously initialized, the YES branch is taken to block 440. Block 440 activates timer 36 to measure time elapsed during the operation of the protected computer program product. It is to be understood, that the time measured by timer 36 begins with the total cumulative elapsed time counted during every prior operation of the protected computer program product. That is, timer 36 stores the cumulative time of every prior operation of the protected computer program product, and resumes its count during the current operation of the protected computer program product. Having started timer 36, block 440 serves as input to decision block 450 where it is determined whether timer 36 has reached a predetermined limit. If the predetermined limit has not been reached, the NO branch of decision block 450 is taken to block 490, where the procedure exits and continues with loading the protected computer program product. Otherwise, the YES branch of decision block 450 is taken to block 460, where a date stamp is created.

The date stamp indicates the time upon which the timer 36 has reached its predetermined value. Accordingly, the date stamp has a date associated therewith, indicating the time at which timer 36 has reached the predetermined value and the time at which an authorized test period is begun. In so doing, timer 36 serves to provide a "burn-in" period to allow a user to start the system 10 prior to undertaking productive use of the protected computer program product in order to perform a meaningful test. It is to be understood that the authorized test period will begin only after the date stamp is created, and that the date stamp is only created upon the timer 36 reaching the predetermined value. It is to be further understood that although shown in RAM 24, timer 36 may be implemented as a discrete hardware component in system 10. In the illustrative embodiment, the predetermined value, for the time of the "burn-in" period, is 24 hours.

Referring back to block 420, the YES branch of decision block 420 and the output of block 460 serve as input to decision block 470, where it is determined whether the time associated with the designated test period has been exceeded. In the illustrative embodiment of the invention, the difference between the current date and the date associated with the date stamp is compared to the designated test period. In the illustrative embodiment, the designated test period is set at 60 days. However, the designated test period is typically determined by the developer or according to the terms of the license agreement. If it is determined that the elapsed days do not exceed the designated test period, the NO branch of decision block 470 is taken to block 490, where the procedure exits and continues with loading the protected computer program product. Otherwise, the YES branch of decision block 470 is taken to block 480, where the load procedure stops. In the illustrative embodiment block 480 includes posting a message to the user that the valid password must be entered in order to access the protected computer program product.

While the invention has been particularly shown and described with reference to one embodiment thereof, it will be understood by those skilled in the art that various changes in form and detail may be made without departing from the spirit and scope of the invention.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4658093 *Jul 11, 1983Apr 14, 1987Hellman Martin ESoftware distribution system
US4740890 *Dec 22, 1983Apr 26, 1988Software Concepts, Inc.Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
US4796181 *Oct 24, 1986Jan 3, 1989Wiedemer John DBilling system for computer software
US4864494 *Mar 21, 1986Sep 5, 1989Computerized Data Ssytems For Mfg., Inc.Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US4885778 *Nov 27, 1985Dec 5, 1989Weiss Kenneth PMethod and apparatus for synchronizing generation of separate, free running, time dependent equipment
US4924378 *Jun 13, 1988May 8, 1990Prime Computer, Inc.License mangagement system and license storage key
US4932054 *Sep 16, 1988Jun 5, 1990Chou Wayne WMethod and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
US4937863 *Mar 7, 1988Jun 26, 1990Digital Equipment CorporationSoftware licensing management system
US5014239 *Feb 9, 1989May 7, 1991Hitachi, Ltd.Magnetic bubble generator using plural conductors with common current source
US5038293 *Sep 10, 1990Aug 6, 1991Postal Buddy CorporationMethod and apparatus for vending customized documents
US5058162 *Aug 9, 1990Oct 15, 1991Hewlett-Packard CompanyMethod of distributing computer data files
US5103476 *Nov 7, 1990Apr 7, 1992Waite David PSecure system for activating personal computer software at remote locations
US5343529 *Sep 28, 1993Aug 30, 1994Milton GoldfineTransaction authentication using a centrally generated transaction identifier
US5386369 *Jul 12, 1993Jan 31, 1995Globetrotter Software Inc.License metering system for software applications
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US5859967 *Jul 9, 1996Jan 12, 1999Faxsav IncorporatedMethod and system for relaying communications from authorized users
US5870543 *Mar 11, 1997Feb 9, 1999Digital River, Inc.System for preventing unauthorized copying of active software
US5883954 *Jun 7, 1995Mar 16, 1999Digital River, Inc.Self-launching encrypted try before you buy software distribution system
US5883955 *Jun 7, 1995Mar 16, 1999Digital River, Inc.On-line try before you buy software distribution system
US5887060 *Jul 14, 1997Mar 23, 1999Digital River, Inc.Central database system for automatic software program sales
US5898778 *Jun 27, 1996Apr 27, 1999Antonini; PierreMethod and device for temporarily authorizing the use of a programme protected by an electronic cartridge
US5903647 *Jun 7, 1995May 11, 1999Digital River, Inc.Self-launching encrypted digital information distribution system
US5907617 *Jul 14, 1997May 25, 1999Digital River, Inc.Try before you buy software distribution and marketing system
US5933625 *Aug 30, 1996Aug 3, 1999Akira SugiyamaUnique time generating device and authenticating device using the same
US5943650 *Jun 27, 1997Aug 24, 1999Hiromasa MurakoshiOperation management system and operation management method
US6023763 *Apr 23, 1997Feb 8, 2000Fisher Controls International, Inc.Method of and apparatus for protecting and upgrading software using a removable hardlock
US6044471 *Jun 4, 1998Mar 28, 2000Z4 Technologies, Inc.Method and apparatus for securing software to reduce unauthorized use
US6272469Nov 25, 1998Aug 7, 2001Ge Medical Systems Global Technology Company, LlcImaging system protocol handling method and apparatus
US6289503 *Sep 24, 1998Sep 11, 2001International Business Machines CorporationSystem and method for trace verification
US6446211Nov 10, 2000Sep 3, 2002Z4 Technologies, Inc.Method and apparatus for monitoring software using encryption
US6460142Mar 27, 2000Oct 1, 200224 Technologies, Inc.Method and apparatus for repeated contact software end-user
US6484264May 18, 2000Nov 19, 2002Z4 Technologies, Inc.Method for providing repeated contact with software end-user using authorized administrator
US6502195May 18, 2000Dec 31, 2002Z4 Technologies, Inc.Computer readable storage medium for providing repeated contact with software end-user
US6510502Jul 17, 2000Jan 21, 2003Kabushiki Kaisha Sega EnterprisesInformation processing device and method for reading information recorded on an information recording medium
US6539544 *Aug 24, 1998Mar 25, 2003Sony CorporationGame machine system, broadcasting system, data distribution system, and method, program executing apparatus and method
US6611957 *Apr 9, 2001Aug 26, 2003Sony CorporationStart signal for a computer program in a network environment with start signal of time information, program ID and CM data
US6618810May 27, 1999Sep 9, 2003Dell Usa, L.P.Bios based method to disable and re-enable computers
US6640335 *Apr 9, 2001Oct 28, 2003Sony CorporationTechnique for executing a software program in response to a received start enable signal that comprises time information, in which execution is not started or is interrupted if the time information is smaller than previously sent time information
US6785825May 31, 2002Aug 31, 2004Z4 Technologies, Inc.Method for securing software to decrease software piracy
US6792548Nov 5, 2001Sep 14, 2004Z4 Technologies, Inc.Method for providing repeated contact with software end-user using authorized administrator
US6792549Nov 5, 2001Sep 14, 2004Z4 Technologies, Inc.Method and apparatus for repeated contact of software end-user
US6795925Nov 5, 2001Sep 21, 2004Z4 Technologies, Inc.Computer readable storage medium for providing repeated contact with software end-user
US6799277Mar 27, 2001Sep 28, 2004Z4 Technologies, Inc.System and method for monitoring software
US6813717May 13, 2002Nov 2, 2004Z4 Technologies, Inc.Method for securing software to reduce unauthorized use
US6813718Jun 26, 2002Nov 2, 2004Z4 Technologies, Inc.Computer readable storage medium for securing software to reduce unauthorized use
US6857078May 30, 2002Feb 15, 2005Z4 Technologies, Inc.Method for securing software to increase license compliance
US6882979 *Jun 18, 1999Apr 19, 2005Onadine, Inc.Generating revenue for the use of softgoods that are freely distributed over a network
US6901371Dec 30, 1999May 31, 2005Ge Medical Systems Global Technology Company, LlcImaging system protocol handling method and apparatus
US6912512Aug 7, 1998Jun 28, 2005Mitsubishi Denki Kabushiki KaishaDigital contents distribution system capable of flexibly changing using conditions
US6912528Jul 19, 2001Jun 28, 2005Gregg S. HomerRechargeable media distribution and play system
US6966002 *Jun 9, 1999Nov 15, 2005Trymedia Systems, Inc.Methods and apparatus for secure distribution of software
US6986063Feb 4, 2003Jan 10, 2006Z4 Technologies, Inc.Method for monitoring software using encryption including digital signatures/certificates
US6988074 *Dec 15, 2000Jan 17, 2006Ge Medical Systems Global Technology Company, LlcImaging system protocol handling method and apparatus
US7016878 *May 13, 1996Mar 21, 2006Fujitsu LimitedContent sales period verifying system and content decryption key effective period verifying system
US7058597Aug 11, 1999Jun 6, 2006Digital River, Inc.Apparatus and method for adaptive fraud screening for electronic commerce transactions
US7092908 *Nov 12, 2004Aug 15, 2006Sl Patent Holdings LlcSystem and method for selling protected information in an oem context
US7162455Mar 24, 1997Jan 9, 2007Akira SugiyamaUnique time generating device and authenticating device using the same
US7165051Feb 22, 2005Jan 16, 2007Digital River, Inc.Electronic commerce system and method for detecting fraud
US7212980Jan 4, 2002May 1, 2007Sharp Kabushiki KaishaTrial management system, program, and computer readable recording medium recording the program
US7234133May 20, 2003Jun 19, 2007Sap AktiengesellschaftSoftware expiry before delivery
US7275032Apr 25, 2003Sep 25, 2007Bvoice CorporationTelephone call handling center where operators utilize synthesized voices generated or modified to exhibit or omit prescribed speech characteristics
US7319988Oct 20, 2004Jan 15, 2008Sl Patent Holdings LlcSystem and method for processing protected audio information
US7330876Oct 13, 2000Feb 12, 2008Aol Llc, A Delaware Limited Liability CompanyMethod and system of automating internet interactions
US7353205Dec 30, 2004Apr 1, 2008Sl Patent Holdings LlcMethod for causing a digital product to revert to a demo mode
US7353207Dec 15, 2004Apr 1, 2008Sl Patent Holdings LlcMethod of altering a software product in response to predetermined events
US7360252 *Mar 9, 2000Apr 15, 2008Macrovision CorporationMethod and apparatus for secure distribution of software
US7415439Jun 9, 2006Aug 19, 2008Nokia CorporationDigital rights management in a mobile communications environment
US7421411Mar 12, 2002Sep 2, 2008Nokia CorporationDigital rights management in a mobile communications environment
US7555463Nov 13, 2006Jun 30, 2009Sl Patent Holdings LlcSystem and method for selectively changing parameter settings based on lineage analysis of digital information
US7558759Nov 19, 2002Jul 7, 2009Contentguard Holdings, Inc.Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US7617124Jan 27, 2000Nov 10, 2009Digital River, Inc.Apparatus and method for secure downloading of files
US7685642Jun 26, 2003Mar 23, 2010Contentguard Holdings, Inc.System and method for controlling rights expressions by stakeholders of an item
US7720767Oct 24, 2005May 18, 2010Contentguard Holdings, Inc.Method and system to support dynamic rights and resources sharing
US7788182 *Apr 12, 2006Aug 31, 2010Contentguard Holdings, Inc.Method for loaning digital works
US7805371Mar 10, 2004Sep 28, 2010Contentguard Holdings, Inc.Rights expression profile system and method
US7831516Dec 6, 2006Nov 9, 2010Sl Patent Holdings LlcSystem and method for redistributing and licensing access to protected information among a plurality of devices
US7840488Nov 14, 2003Nov 23, 2010Contentguard Holdings, Inc.System and method for granting access to an item or permission to use an item based on configurable conditions
US7877412 *May 9, 2005Jan 25, 2011Homer Gregg SRechargeable media distribution and play system
US7881972Oct 12, 2006Feb 1, 2011Digital River, Inc.Electronic commerce system and method for detecting fraud
US7895076Apr 7, 2006Feb 22, 2011Sony Computer Entertainment Inc.Advertisement insertion, profiling, impression, and feedback
US7962417Sep 30, 2004Jun 14, 2011Sl Patent Holdings LlcSystem and method for distributing protected information
US7970709Mar 31, 2003Jun 28, 2011Contentguard Holdings, Inc.Method and apparatus for client customization by executing software parts on plural servers
US7974923Nov 18, 2002Jul 5, 2011Contentguard Holdings, Inc.Extensible rights expression processing system
US8050980Sep 29, 2009Nov 1, 2011Digital River, Inc.Secure downloading of a file from a network system and method
US8095597May 1, 2001Jan 10, 2012Aol Inc.Method and system of automating data capture from electronic correspondence
US8108313Mar 14, 2003Jan 31, 2012Contentguard Holdings, Inc.Rights expression profile system and method using templates
US8140435Nov 4, 2004Mar 20, 2012Sl Patent Holdings LlcSystem and method for processing protected text information
US8216071Mar 20, 2002Jul 10, 2012Intel CorporationMethod and apparatus for software delivery and management
US8244579Mar 27, 2006Aug 14, 2012Contentguard Holdings, Inc.Method and apparatus for distributing enforceable property rights
US8267783Sep 30, 2009Sep 18, 2012Sony Computer Entertainment America LlcEstablishing an impression area
US8271396Oct 12, 2006Sep 18, 2012Digital River, Inc.Electronic commerce system and method for detecting fraud
US8272964Sep 30, 2009Sep 25, 2012Sony Computer Entertainment America LlcIdentifying obstructions in an impression area
US8327454 *Nov 14, 2006Dec 4, 2012Sandisk Technologies Inc.Method for allowing multiple users to access preview content
US8332328Jun 23, 2010Dec 11, 2012Sl Patent Holdings LlcSystem and method for redistributing and licensing access to protected information among a plurality of devices
US8416247Sep 12, 2008Apr 9, 2013Sony Computer Entertaiment America Inc.Increasing the number of advertising impressions in an interactive environment
US8484751Jan 24, 2013Jul 9, 2013Contentguard Holdings, Inc.System and method for permitting use of content
US8533807Nov 18, 2011Sep 10, 2013Sandisk Technologies Inc.Methods for accessing content based on a session ticket
US8543511Apr 29, 2003Sep 24, 2013Contentguard Holdings, Inc.System and method for specifying and processing legality expressions
US8560621Dec 1, 2011Oct 15, 2013Mercury Kingdom Assets LimitedMethod and system of automating data capture from electronic correspondence
US8574074Sep 30, 2005Nov 5, 2013Sony Computer Entertainment America LlcAdvertising impression determination
US8626584Sep 26, 2006Jan 7, 2014Sony Computer Entertainment America LlcPopulation of an advertisement reference list
US8645992Aug 12, 2008Feb 4, 2014Sony Computer Entertainment America LlcAdvertisement rotation
US8660961Nov 18, 2004Feb 25, 2014Contentguard Holdings, Inc.Method, system, and device for license-centric content consumption
US8671461Aug 20, 2012Mar 11, 2014Contentguard Holdings, Inc.System, apparatus, and media for granting access to and utilizing content
US8676900Oct 25, 2006Mar 18, 2014Sony Computer Entertainment America LlcAsynchronous advertising placement based on metadata
US8763090May 18, 2010Jun 24, 2014Sony Computer Entertainment America LlcManagement of ancillary content delivery and presentation
US8763110Nov 14, 2006Jun 24, 2014Sandisk Technologies Inc.Apparatuses for binding content to a separate memory device
US8763157Mar 3, 2010Jun 24, 2014Sony Computer Entertainment America LlcStatutory license restricted digital media playback on portable devices
US8768850May 12, 2011Jul 1, 2014Contentguard Holdings, Inc.Method, system, and device for license-centric content consumption
US8769558Feb 12, 2009Jul 1, 2014Sony Computer Entertainment America LlcDiscovery and analytics for episodic downloaded media
US8795076Jul 10, 2013Aug 5, 2014Sony Computer Entertainment America LlcAdvertising impression determination
US8832149Jan 21, 2011Sep 9, 2014Gregg S. HomerMethod for subscription media on-demand
US20080051069 *Aug 25, 2006Feb 28, 2008Research In Motion LimitedMethod and system for managing trial service subscriptions for a mobile communications device
US20130006870 *Sep 13, 2012Jan 3, 2013Contentguard Holdings, Inc.System and method for participating in transactions between computing devices
US20130006871 *Sep 13, 2012Jan 3, 2013Contentguard Holdings, Inc.System and method for participating in transactions between computing devices
US20130108243 *Dec 19, 2012May 2, 2013Sony CorporationRecording medium and apparatus for protecting copyrighted digital data
USRE41227 *Oct 31, 2007Apr 13, 2010Nash Kenneth LSystem for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
WO1999059058A1 *May 14, 1999Nov 18, 1999Sega Enterprises KkInformation processor, information processing method, information recorded medium, and information processing system
Classifications
U.S. Classification711/164, 340/5.28, 340/5.74, 705/51
International ClassificationG06F21/00, G06F21/22, G06F1/00
Cooperative ClassificationG06F21/10
European ClassificationG06F21/10
Legal Events
DateCodeEventDescription
Sep 26, 2008SULPSurcharge for late payment
Year of fee payment: 11
Sep 26, 2008FPAYFee payment
Year of fee payment: 12
Apr 14, 2008REMIMaintenance fee reminder mailed
Jan 20, 2004FPAYFee payment
Year of fee payment: 8
Jan 5, 2000FPAYFee payment
Year of fee payment: 4
May 20, 1994ASAssignment
Owner name: INTERNATIONAL BUSINESS MACHINES CORP., NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRANTZ, JEFFREY A.;URE, J. ROBERT;REEL/FRAME:007004/0697
Effective date: 19940520